This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Public Services

Free public service guide: encrypted DNS access rules for basic ad-blocking and privacy protection, selection advice, and enabled subscription lists.

We provide free public services and have curated a set of widely-used domain lists.

Public Service Rules

The public service employs balanced ad-blocking rules; false positives or misses may occur. The rule lists are:

Some users configure extra protection for elderly family members, so we also include security-blocking rules:

Additionally, the public service includes the following rules to block stubborn ads on certain phones that cannot be removed by conventional means:

# huawei search && browser
hisearch-drcn.dt.dbankcloud.com
uc-drcn.hispace.dbankcloud.cn
connect-drcn.hispace.hicloud.com
adx-drcn.op.dbankcloud.cn
hisearch-static-drcn.dbankcdn.com
||configserver.hicloud.com
||configserver.platform.hicloud.com
||configdownload.dbankcdn.cn
||browsercfg-drcn.cloud.dbankcloud.cn

Usage Notes

Because the public service is intended for the general population, it cannot accommodate personalized needs. Some users complain that ad-blocking is insufficient, while others report that false positives prevent game logins. We apologize that the public service cannot satisfy everyone; content that some view as ads may be useful information to others. In such cases, we tend to prioritize users who consider it useful.

When a false positive prevents WeChat or Alipay mini-programs from loading, simply disable the phone’s encrypted DNS setting temporarily to access the required service. However, based on our operational experience, many users do not know what to do when a service fails to work properly, so we must consider non-technical users’ experience.

Users familiar with DNS who encounter false positives or insufficient blocking should consider purchasing a private service.

Private services offer access logs, blocking logs, statistics, custom rules, authoritative resolution, and more to meet individual needs.

For other common requests,

Need help?

Contact on WeChat private6688
or Send email service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.

Setup Instructions by Platform

Android

Android has natively supported DNS over TLS (DoT) since Android 9; phones released after 2019 are compatible. Enable it as follows:

  1. Open Settings
  2. Go to More connections
  3. Open Private DNS
  4. Choose Private DNS provider hostname and enter: public.adguardprivate.com

Self-hosted DNS can be implemented in many ways (e.g., AdGuard, dnsmasq, clash), but only native DoT has zero impact on phone performance. It requires no third-party apps, no permissions, no resources, and does not affect battery life. Therefore, native DoT encrypted DNS is recommended.

iPhone

iOS 14 and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:

  1. Open Safari, download the profile: dot.mobileconfig
  2. Open Settings
  3. Go to General
  4. Open VPN & Device Management
  5. Select Install Profile

macOS

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:

  1. Open Safari, download the profile: dot.mobileconfig
  2. Open System Preferences
  3. Go to Network
  4. Select VPN & Device Management
  5. Choose Install Profile

1 - Android

Detailed instructions on configuring DNS encryption for various Android phone brands

Feature Description

Android 9 and above natively support DNS over TLS (DoT) encryption, protecting DNS queries from eavesdropping and tampering.

Setup Methods

Setup paths may vary across different phone brands. Here are specific steps for common brands:

Xiaomi/Redmi Phones

  1. Open Settings
  2. Select Connections & Sharing
  3. Click Private DNS
  4. Choose Private DNS provider hostname
  5. Enter: public.adguardprivate.com

Samsung Phones

  1. Open Settings
  2. Select Connections
  3. Click More connection settings
  4. Choose Private DNS
  5. Select Private DNS provider hostname
  6. Enter: public.adguardprivate.com

OPPO/OnePlus Phones

  1. Open Settings
  2. Select Wi-Fi & Network
  3. Click Private DNS
  4. Choose Private DNS provider hostname
  5. Enter: public.adguardprivate.com

Other Brands

Find related settings through:

  • Searching “DNS” or “Private DNS” in Settings
  • Checking network settings or advanced network options

FAQs

How to verify if settings are effective?

  1. After setup, the system automatically verifies DNS server
  2. If showing “Connected” or checkmark, the setup is successful

Troubleshooting Failed Setup

  1. Ensure the entered domain name is completely correct
  2. Check network connection status
  3. Confirm Android version compatibility (requires Android 9+)

Setup Demo

2 - iPhone

Detailed guide on configuring DNS encryption on iPhone

Feature Overview

Starting from iOS 14, iPhone natively supports encrypted DNS features including:

  • DNS over HTTPS (DoH) - Encrypts DNS queries via HTTPS protocol
  • DNS over TLS (DoT) - Encrypts DNS queries via TLS protocol

These features effectively protect your network privacy and prevent DNS hijacking.

Configuration Steps

1. Download Configuration File

Use Safari browser to download the configuration file: dot.mobileconfig

2. Install Configuration File

  1. Open the Settings app
  2. Go to General > VPN & Device Management
  3. Select and install the public.adguardprivate.com DoT configuration profile

Special Notes

If you have enabled iCloud Private Relay, you need to:

⚠️ Security Warning
Exercise extreme caution when installing configuration profiles. The profiles provided on this site are solely for legitimate privacy protection and ad-blocking services.
Do not install configuration profiles from unknown sources as this may compromise your device security.

Configuration Demo Video

3 - macOS

Detailed instructions on how to configure DNS encryption on macOS

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). You can enable encrypted DNS as follows:

  1. Open the built-in Safari browser and download the configuration file: dot.mobileconfig
  2. Open System Settings
  3. Go to Privacy & Security
  4. Select Profiles
  5. Under “Downloaded,” choose public.adguardprivate.com DoT to install

Please note that this is an unconventional way to modify system settings. We generally advise iPhone users not to install configuration files from unknown sources unless you are certain of their origin. This site provides legitimate personal-privacy protection and ad-blocking services and will never perform any actions that are harmful or objectionable to users. This disclaimer is intended to remind you that, even if you trust me, you should not readily trust configuration files provided by other websites. I will cover the potential risks of modifying system DNS settings in this manner in another article.

The complete contents of the configuration file are shown below. You can copy the text and paste it into your iPhone’s settings, or simply click the link above to download the file.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
	<dict>
		<key>PayloadContent</key>
		<array>
			<dict>
				<key>DNSSettings</key>
				<dict>
					<key>DNSProtocol</key>
					<string>TLS</string>
					<key>ServerName</key>
					<string>public.adguardprivate.com</string>
				</dict>
				<key>PayloadDescription</key>
				<string>Configures device to use NullPrivate</string>
				<key>PayloadDisplayName</key>
				<string>public.adguardprivate.com DoT</string>
				<key>PayloadIdentifier</key>
				<string>com.apple.dnsSettings.managed.11b4d48d-8e9b-4e15-b7c1-45cb1c564c99</string>
				<key>PayloadType</key>
				<string>com.apple.dnsSettings.managed</string>
				<key>PayloadUUID</key>
				<string>e9819f0c-250e-49b7-ad89-c0db078c72f0</string>
				<key>PayloadVersion</key>
				<integer>1</integer>
			</dict>
		</array>
		<key>PayloadDescription</key>
		<string>Adds NullPrivate to macOS Big Sur and iOS 14 or newer systems</string>
		<key>PayloadDisplayName</key>
		<string>public.adguardprivate.com DoT</string>
		<key>PayloadIdentifier</key>
		<string>e0b7d7db-e0d1-4bce-bcf4-8ada45d2f5a3</string>
		<key>PayloadRemovalDisallowed</key>
		<false/>
		<key>PayloadType</key>
		<string>Configuration</string>
		<key>PayloadUUID</key>
		<string>0404cb98-3621-4f97-9530-b18288633d40</string>
		<key>PayloadVersion</key>
		<integer>1</integer>
	</dict>
</plist>